Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients visiting them.
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing.
A recent study conducted by Carnegie Mellon and Notre Dame University researchers is calling attention to several interesting things.
Users of screenshot-grabbing-and-easy-sharing app Puush are in danger of having their passwords stolen by malware that masquerades as the (then) latest update for the app.
In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.